CVE-2023-43804

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-43804
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-43804.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-43804
Aliases
Downstream
Related
Published
2023-10-04T16:01:50Z
Modified
2025-10-08T14:32:39.808966Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
`Cookie` HTTP header isn't stripped on cross-origin redirects
Details

urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.

References

Affected packages

Git / github.com/urllib3/urllib3

Affected ranges

Type
GIT
Repo
https://github.com/urllib3/urllib3
Events
Type
GIT
Repo
https://github.com/urllib3/urllib3
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.3
0.3.1
0.4
0.4.1

1.*

1.0
1.0.1
1.0.2
1.1
1.10
1.10.1
1.10.2
1.2
1.2.1
1.25
1.25.1
1.25.2
1.25.3
1.25.4
1.25.5
1.25.6
1.25.7
1.25.8
1.26.0
1.26.1
1.26.10
1.26.11
1.26.12
1.26.13
1.26.14
1.26.15
1.26.16
1.26.2
1.26.3
1.26.4
1.26.5
1.26.6
1.26.7
1.26.8
1.26.9
1.3
1.4
1.5
1.6
1.7
1.7.1
1.8
1.8.1
1.8.2
1.8.3
1.9
1.9.1

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5

v2.*

v2.0.5